2021 IEEE Design Methodologies Conference (DMC) 2021
DOI: 10.1109/dmc51747.2021.9529949
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Man-in-the-Middle (MITM) Attack Detection for Photovoltaic Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…As most smart inverters are resource-constrainted devices, smart inverter developers need to prioritize the IPs based on their security budget and severity. Besides, additional external security system, such as malware file screening server [74] and blockchain security server [103], can be used to support additional computational resources for M-IP1, HT-IP, CF-IP, CC-IP, and EM-IPs, while smart inverters install APIs accessing the external system.…”
Section: Cyber-resilient Smart Inverter Security By Designmentioning
confidence: 99%
See 1 more Smart Citation
“…As most smart inverters are resource-constrainted devices, smart inverter developers need to prioritize the IPs based on their security budget and severity. Besides, additional external security system, such as malware file screening server [74] and blockchain security server [103], can be used to support additional computational resources for M-IP1, HT-IP, CF-IP, CC-IP, and EM-IPs, while smart inverters install APIs accessing the external system.…”
Section: Cyber-resilient Smart Inverter Security By Designmentioning
confidence: 99%
“…In [45], incoming setpoints are autonomously examined using the knowledgebased self-security technique with reference models and only the safe setpoints are engaged to the inverter's local controller. Meanwhile, a blockchain-based MITM attack detection method is implemented in a solar inverter system by tracking the integrity of the control commands [103]. CC-ID is designed to postdetect a malicious control command after it changes the smart inverter control.…”
Section: E Mitm Attacks Defense (Attacks #11 and 12)mentioning
confidence: 99%
“…Fig. 6 shows three potential MITM attack cases that can change in-transit data in a PV system [49]: 1) a wide-area network (WAN) MITM, 2) an unauthorized device MITM; and 3) an authorized device MITM. WAN MITM attacks could be caused by a third party, such as a virtual private network (VPN) provider, a domain name server (DNS), or an internet service provider (ISP)).…”
Section: Network and Software/firmware Security In Pv Farmmentioning
confidence: 99%
“…These attacks are solved thanks to encrypted communications over secure channels in which the keys are stored in the TPM. If an attacker is sniffing the channel, all he will see is the encrypted data and will not be able to decrypt it because the keys are securely stored in the TPM [83]. • Brute force attacks: Through trying combinations in the seed of a key generation, the attacker can find out a cryptographic key.…”
Section: F Security Analysismentioning
confidence: 99%